Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Using the SQL for Dummies textbook in the CSU Online Library, refer to Table 3-4

ID: 3671504 • Letter: U

Question

Using the SQL for Dummies textbook in the CSU Online Library, refer to Table 3-4 “Types of Protection” on page 74 to create three scenarios in which the use of protection operations are used to secure a database. Describe the scenario, select which protection operations users should use in the scenario, and then explain your selection.

Your paper should be three pages in length. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations, and cited per APA guidelines.

Explanation / Answer

Database is a group of data arranged in rows and columns and it is extremely important to secure the data kept in the database.The following are the ways that help to secure a database:

1.Anonymous user service access:If a user does not have a valid username and password he must be rejected from logging into the servers.This can be done at various levels:

a)The anonymous user must be rejected from the administrator groups.

b)The anonymous user must be rejected from the various application roles and his work and privileges may be removed instantly.

2.Minimum password length:The password to loginto a database must be strong so that it cannot be guessed.It should include digits,alphabets and numbers,It must be of atleast 10 characters.

3.The network address restriction for the server access:

With the help of the IP addess filtering we can specify which clients are allowed to be connected to a server and which should not be allowed at all.This is dont to prevent an unaithorized access to a given server.

4.Minimize the sql server exposure:The server should be accessed by the people who have a valid username and password.There should be a ont time password at every step so that only authorized users can access it.If an intruder tries to access it ,he should be immediately removed using an antispyware software.This ensures data secrecy and privacy is maintained.

5.Encrypt the various data stored in database:The data can be encrypted using a key so that only authorized users can decrypt it using the key and even if an unknown user logs into the system he cannot read or access the files since they are present in a language unknown to him .This ensures a high level of confidentility and makign sure only legal users login to the system.

6.Monitor the database activity regularly:This helps to find intrusions and get rid off them instantly.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote